After i give presentations upon security, especially cellular security, I tension that it's essential for mobile professionals to show their Bluetooth gadgets OFF. The reason behind this really is that hackers may access your mobile phones through their Wireless bluetooth connectivity. Think I am joking? Symantec creates about it right here .
(I understand many you believe âBluetoothâ is really a headset for the cellular phone. NUMBER Bluetooh is really a wireless technology that lots of mo bile phones â" like wifi headsets use â" for connecting to devices).
W32. Flamer  is probably the only Windows centered threat we have came across which uses Wireless bluetooth. It is another indicator which W32. Flamer is not just remarkable, but that it must be an extensive information gathering and also espionage tool. The particular CrySyS laboratory offers previously recorded  the technical information on Bluetooth within W32. Flamer. However what does this particular actually mean for possible victims targeted simply by Flamer? So what can an attacker achieve using Wireless bluetooth?
The particular Bluetooth functionality within Flamer is encoded in the module known as âBeetleJuiceâ. Thi s component is triggered based on configuration values established by the assailant. When triggered this performs two primary activities:
- The very first is to find all Bluetooth gadgets in range. Whenever a device is located, its condition is queried and also the details of the unit recorded-including it is ID-presumably to be published to the attacker eventually.
- The 2nd action would be to configure itself as being a Wireless bluetooth beacon. Which means that a pc compromised simply by W32. Flamer can look when every other Bluetooth device tests the local region. And there is certainly more. Along with enabling the Wireless bluetooth beacon, Flamer encodes information about the infected personal computer (see Figure 1) then stores this data in a specific âdescription' area.
Look at the full post right here.
Â